CVE-2025-15118
📋 TL;DR
This vulnerability allows unauthorized modification of member address data in macrozheng mall versions up to 1.0.3. Attackers can exploit improper authorization in the /member/address/update/ endpoint to alter user address information without proper permissions. This affects all deployments running vulnerable versions of the software.
💻 Affected Systems
- macrozheng mall
📦 What is this software?
Mall by Macrozheng
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify address information for any user, potentially enabling social engineering, account takeover, or delivery interception in e-commerce scenarios.
Likely Case
Unauthorized users modify address data for other members, causing data integrity issues and potential privacy violations.
If Mitigated
With proper authorization controls, only legitimate users can modify their own address data, preventing unauthorized changes.
🎯 Exploit Status
Exploit has been publicly disclosed and remote exploitation is possible, though authentication may be required to reach the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Consider upgrading to version 1.0.4 or later if available, or implement workarounds.
🔧 Temporary Workarounds
Implement Proper Authorization Checks
allAdd authorization verification to ensure users can only modify their own address data
Modify /member/address/update/ endpoint code to verify user ID matches address owner
Disable Vulnerable Endpoint
allTemporarily disable the /member/address/update/ endpoint until proper fix is available
Comment out or remove endpoint mapping in Spring Boot configuration
🧯 If You Can't Patch
- Implement network-level access controls to restrict access to the vulnerable endpoint
- Deploy a web application firewall (WAF) with rules to detect and block unauthorized address update attempts
🔍 How to Verify
Check if Vulnerable:
Test if you can modify another user's address data by sending a PUT/POST request to /member/address/update/ with a different user ID
Check Version:
Check pom.xml or application.properties for version information
Verify Fix Applied:
Verify that authorization checks prevent modifying addresses belonging to other users
📡 Detection & Monitoring
Log Indicators:
- Multiple address update requests from same IP for different user IDs
- Failed authorization attempts on /member/address/update/ endpoint
Network Indicators:
- Unusual patterns of PUT/POST requests to /member/address/update/
- Requests with mismatched user IDs in address update operations
SIEM Query:
source="web_logs" AND uri="/member/address/update/" AND (user_id != address_owner_id OR authorization_failure=true)